This course provides learners with the knowledge and skills required to mitigate the risks associated with Low-code/No-code (LCNC) Account impersonation and is designed Software Developers, Vulnerability Assessment Analysts, and Systems Requirements Planners. The concepts discussed align with the OWASP Low-code/No-code Top 10 guidelines. Low-code/No-code applications can be embedded with a developer account which is then used implicitly by any application user. This practice creates a direct path towards privilege escalation, allows an attacker to hide behind another user’s identity, and circumvents traditional security controls.
Learning Objectives
Upon successful completion of this course, learners should have the knowledge and skills to:
- Adhere to the principle of least privilege when provisioning connections to databases, services, and SaaS
- Ensure applications use dedicated service or application accounts rather than user accounts
- Use a single consistent identity across all their connections
- Maintain a proper audit trail to identify the actor behind actions performed through the shared connections
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Vulnerability Assessment and Management
- Software Development
- Systems Requirements Planning
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.